From post

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем

A Generic Model for Analyzing Security Protocols., , , и . MMM-ACNS, том 3685 из Lecture Notes in Computer Science, стр. 119-128. Springer, (2005)Coalitional Game Theory for Communication Networks: A Tutorial, , , , и . (2009)cite arxiv:0905.4057 Comment: IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009. IEEE Signal Processing Magazine, Special Issue on Game Theory, to appear, 2009.CatchIt: Detect Malicious Nodes in Collaborative Spectrum Sensing., , , и . GLOBECOM, стр. 1-6. IEEE, (2009)Attack-proof collaborative spectrum sensing in cognitive radio networks., , , и . CISS, стр. 130-134. IEEE, (2009)The Name-Passing Calculus., и . CoRR, (2015)Distributed Power Control Based on Constrained MPC in Cognitive Satellite Terrestrial Networks., , , , , и . IWCMC, стр. 994-999. IEEE, (2020)UAV Position Optimization Based on Information Freshness: A Mean Field Game Approach., , , , , и . WCSP, стр. 1-5. IEEE, (2021)Smart Meter Data Characterization and Clustering for Peak Demand Targeting in Smart Grids., , , и . ISGT Europe, стр. 1-6. IEEE, (2018)Content Caching Policy Based on GAN and Distributional Reinforcement Learning., , , , и . ICC, стр. 1-5. IEEE, (2020)UAV-Aided Low Latency Mobile Edge Computing with mmWave Backhaul., , , , и . ICC, стр. 1-7. IEEE, (2019)